To quote, roughly translated: Today, Yoshihiro presents a tool that will please all the players in the community: Game Decrypter, which will allow owners of games requiring firmware 5.55 can play on Custom Firmwares 5.50GEN-B and 5.03GEN.

To do this, you will get the file EBOOT.BIN an ISO that you created with the utility UMDGen.

Most games asking the 5.55 can be treated with this tool. Some games (list available soon) will be impervious to manipulation, they require a patch to the image of him created to run Soulcalibur: Broken Destiny. But generally, you can finally play your own backups, without having to install official firmware.

What PSP can benefit?

The PSP Custom Firmware 5.50GEN-B. The PSP 2000-v3 and 3000 using the 5.03GEN (use mode driver in the M33 vsh menu).

DecryptPRX2 cannot handle these new "type 3" prx, so I imported PSPCipher kprx_decrypt function to make this psardumper to work. After decrypting, a new game key (0xd91680f0) is found in mesg_led_01.prx. It is likely we kicked sony's ass again.

Credit: tpu dumped the IPL, and I found out what happened to the IPL decryptor.

Note: this source has been already covered by GPLv3 becuase of the usage of PSPCipher source.

2010-06-30: newpsardump-630-1.zip
A minor update to understand files tables of 6.30
- 100X/200X/300X: new tables for 07g and 09g
- go: uses the same table key as 100X/200X/300X
No 6.30 keys are added, files from 6.30 can only be extracted in encrypted form.
Also I have just updated the source code and compile, the program has not been tested.

Many of you will remember who you had the CFW 5.00 M33-6 how annoying it was to activate or deactivate version.txt that would change the options to speed up the memory stick. Well our good friend on her day DAX took a mini patch that solved this little bug, but not brought to light not to be as important and not make too much however it is now necessary to enter the Store with PSNLover of must have seen the light of this Mini Patch.

PRXDecrypter v2.6b is also below: j416.dip.jp/blog/?p=146

This mod of psardumper can decrypt individual firmware modules from retail firmwares and modules from retail games PRXs, and it can decompress M33 custom firmware modules.

The keys for the tag 0xD91613F0 has been successfully decrypted. Includes source code. Can decrypt/decompress/extract:

PSARDumper is used to decrypt and extract all files contained in an EBOOT from official update. Includes source code and keys for almost all 6.x firmwares including official firmware 6.35 by coyotebean.

PRXDecrypter, is an application developed by Jas0nuk initially to decrypt firmware modules, games eboots.bin ... I just updated the PRXDecrypter 2.6b, with new keys for 6.xx and added some features like extracting hidden prx for firmwares 6.xx

It's a completely rewritten prx decryptor based on 6.20 mesg_led_02g.prx. Right now there is only a POC version, but it already can decrypt 0x2e5e10f0, the key tag which pspdecrypt.prx failed to handle with. It also means you can decrypt PBOOT.PBP (game patch) since many patches use 0x2e5e10f0 to encrypt themselves.

Usage:
Use unpack-pbp to unpack a PBOOT.BIN.
Rename DATA.PBP to EBOOT.BIN and move to ms0:/enc/.
Run PSPCipher, the EBOOT.BIN will be decrypted.
Replace original ISO with new EBOOT.BIN and PARAM.SFO. If you use Prometheus module then EBOOT.OLD instead.

Another update to PRXDecrypter is attached below, although it's an unofficial release from homebrew coder hrimfaxi (http://bbs.a9vg.com/read.php?tid=1461230) it apparently works with Metal Gear Peace Walker (new key tag as UNO, 0xD91613F0) and a few other games (Ikki Tousen Xross Impact and Uno) to decrypt eboot.bin for use with PSP CFW.

2.4a --> 2.4b
- Decryption error for an old key, tag 0x4C940AF0, fixed.
- Decryption key added for pops_04g.prx from 6.XX firmwares - tag 0x457B1EF0
- Slightly more information when encryption is likely to fail (SHA-1 check warning)
- NOTE: key for tag 0x2E5E10F0 does not appear to be working due to a new encryption method. I'll look into it.
- New EBOOT.BIN key added for tag 0x2E5E12F0. As above, might not work.